pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INTRUSION DETECTION IN WIRELESS AD-HOC NETWORKS
By: Nabendu Chaki (Editor), Rituparna Chaki (Editor)
Format: Hardback

List price: £94.99
Our price: £85.49
Discount:
10% off
You save: £9.50
ISBN 10: 1466515651
ISBN 13: 9781466515659
Availability: Usually dispatched within 1-3 weeks.
 Delivery rates
Stock: Currently 0 available
Publisher: TAYLOR & FRANCIS INC
Pub. date: 27 January, 2014
Pages: 258
Synopsis: Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. * Addresses architecture and organization issues * Examines the different types of routing attacks for WANs * Explains how to ensure Quality of Service in secure routing * Considers honesty and trust-based IDS solutions * Explores emerging trends in WAN security * Describes the blackhole attack detection technique Surveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications.Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.
Illustrations: 75 black & white illustrations, 9 black & white tables
Publication: US
Imprint: CRC Press Inc
Returns: Returnable
Some other items by this author:
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. COMPUTER SCIENCE AND ENGINEERING (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. NETWORKS AND COMMUNICATIONS (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN NETWORK SECURITY AND APPLICATIONS (PB)
APPLIED COMPUTATION AND SECURITY SYSTEMS (PB)
APPLIED COMPUTATION AND SECURITY SYSTEMS (PB)
BUSINESS STANDARD COMPLIANCE AND REQUIREMENTS VALIDATION USING GOAL MODELS
BUSINESS STANDARD COMPLIANCE AND REQUIREMENTS VALIDATION USING GOAL MODELS (HB)
COMPUTER INFORMATION SYSTEMS - ANALYSIS AND TECHNOLOGIES (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER NETWORKS & COMMUNICATIONS (NETCOM)
COMPUTER NETWORKS & COMMUNICATIONS (NETCOM) (HB)
CONCURRENCY CONTROL IN DISTRIBUTED SYSTEM USING MUTUAL EXCLUSION (HB)
CONCURRENCY CONTROL IN DISTRIBUTED SYSTEM USING MUTUAL EXCLUSION (PB)
DYNAMIC REVERSE FURTHEST NEIGHBOR
EXPLORING IMAGE BINARIZATION TECHNIQUES (HB)
EXPLORING IMAGE BINARIZATION TECHNIQUES (PB)
EXPLORING NEURAL NETWORKS WITH C#
EXPLORING NEURAL NETWORKS WITH C# (PB)
HYPER-LATTICE ALGEBRAIC MODEL FOR DATA WAREHOUSING (PB)
INTRUSION DETECTION IN WIRELESS AD-HOC NETWORKS
MOBILE AD-HOC NETWORK AND WIRELESS COMMUNICATIONS (HB)
MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION (PB)
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (HB)
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (HB)
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING (HB)
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS (PB)
RECENT TRENDS IN NETWORKS AND COMMUNICATIONS (PB)
RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS (PB)
SECURITY IN IOT (HB)
TRENDS IN NETWORK AND COMMUNICATIONS (PB)

TOP SELLERS IN THIS CATEGORY
BTEC Nationals Information Technology (Mixed media product)
Pearson Education Limited
Our Price : £29.84
more details
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £11.99
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Web Application Security ()
O''Reilly Media
Our Price : £38.68
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 

NEW
Ramadan and Eid al-Fitr A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
add to basket

Learning
That''s My Story!: Drama for Confidence, Communication and C... The ability to communicate is an essential life skill for all children, underpinning their confidence, personal and social wellbeing, and sense of self.
add to basket